城市(city): unknown
省份(region): unknown
国家(country): Taiwan (Province of China)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.13.104.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64896
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;39.13.104.229. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 17:28:53 CST 2025
;; MSG SIZE rcvd: 106
229.104.13.39.in-addr.arpa domain name pointer 39-13-104-229.adsl.fetnet.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
229.104.13.39.in-addr.arpa name = 39-13-104-229.adsl.fetnet.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 1.203.80.2 | attack | firewall-block, port(s): 1433/tcp |
2020-08-01 23:58:14 |
| 51.140.93.143 | attackbots | Aug 1 14:20:05 debian-2gb-nbg1-2 kernel: \[18542886.076940\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=51.140.93.143 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=237 ID=27953 PROTO=TCP SPT=44189 DPT=3389 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-08-01 23:51:52 |
| 142.44.161.132 | attack | Bruteforce detected by fail2ban |
2020-08-01 23:55:54 |
| 111.120.86.111 | attackbots | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-08-02 00:10:39 |
| 89.151.46.24 | attackspam | Email rejected due to spam filtering |
2020-08-02 00:20:29 |
| 51.83.131.209 | attackbots | 2020-08-01T06:12:57.097042perso.[domain] sshd[1295105]: Failed password for root from 51.83.131.209 port 49626 ssh2 2020-08-01T06:17:29.822392perso.[domain] sshd[1297231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.131.209 user=root 2020-08-01T06:17:31.846889perso.[domain] sshd[1297231]: Failed password for root from 51.83.131.209 port 33884 ssh2 ... |
2020-08-02 00:19:25 |
| 121.205.213.123 | attack | port scan and connect, tcp 23 (telnet) |
2020-08-02 00:32:40 |
| 84.17.51.142 | attack | (From no-replynen@google.com) Gооd dаy! If you want to get ahead of your competition, have a higher Domain Authority score. Its just simple as that. With our service you get Domain Authority above 50 points in just 30 days. This service is guaranteed For more information, check our service here https://www.monkeydigital.co/Get-Guaranteed-Domain-Authority-50/ thank you Mike Ogden Monkey Digital support@monkeydigital.co |
2020-08-02 00:11:49 |
| 178.212.64.52 | attackbots | Dovecot Invalid User Login Attempt. |
2020-08-02 00:31:43 |
| 93.174.93.195 | attackspambots |
|
2020-08-01 23:52:40 |
| 45.129.33.22 | attackspambots |
|
2020-08-01 23:49:37 |
| 37.49.224.49 | attack |
|
2020-08-01 23:53:57 |
| 96.57.105.245 | attackbotsspam | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-08-01 23:47:13 |
| 1.54.34.55 | attack | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-08-01 23:58:42 |
| 223.228.146.66 | attack | Email rejected due to spam filtering |
2020-08-02 00:08:36 |